Article Side

Online Article Directory!

Hello Guest! Login or Register to submit articles!

Different Types of Computer Infections – Protect Your Data from viruses and worms

By Jack Kallis Subscribe to RSS | March 30th 2012 | Views:

Computers though were made to make ones work and life easier. Internet was an icing to the cake. But soon this icing proved fatal and hence not favorable for the system’s health. Computers encounter threat from various malicious applications with different names, types, intensity and the level of destruction posed. It is extremely necessary to be acquainted with these malevolent objects that are always residing in the cyberspace with an eagle’s sight for tracing loopholes leading to your computer. Here comes the need to get the system shielded and fortified by strong Antivirus protection. Few of the most ferocious and fatal malicious software programs known are as follows:


Computer viruses can be of varied origin, techniques, infected file types, hiding area, damage consequences, concerned operating system or etc. below are a few common type of viruses:

• Resident Virus

• Direct Action Viruses

• Overwrite Viruses

• Boot Sector Virus

• Macro Virus

• Directory Virus

• Polymorphic Virus

• File Infector Virus

• Companion Viruses

• FAT Virus

• Multipartite Virus

• Web Scripting Virus


These programs bear close resemblance to viruses. They can self replicate and impact your PC negatively. Antivirus programs can detect and prove effective in worm removal.

Examples: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.

Trojans or Trojan Horses

Malicious codes come in yet another filthy variation, the Trojans or Trojan horses. It is program which masquerades a useful program or application and back stab the system.

Logic Bombs

These are not programs, rather eventually they camouflage as segments of other programs. Once certain preset parameters are met, they destroy data on the computer. Logic bombs remain untraced until launched and cause destruction.

But how do you know if your system is infected? Here are some of the very common symptoms which when occurs are the signal of being compromised:

• Unexpected error messages or images appear.

• Strange sounds emits randomly.

• Sudden startup of programs.

• Personal firewall signals of an application having tried to connect to the Internet other than a program run by you).

• Sending e-mail messages from the users address list without the user’s consent.

• Frequent PC freezing or slow running programs.

• Unpredictable and inconsistent behavior of web browser.

But often it is challenging to find whether your computer has been compromised. Today there are varieties of technology loaded worm protection and antivirus programs to combat the cyber foes of the computers. But to keep pace and implement warfare the creators of viruses, worms, Trojans and spyware are tracing out incredible paths to hide their code and cover up the misdeeds their programs improvise on an infected computer. Hence it is utterly necessary to avail the best antivirus support to install Internet security software, ensure security patches are functional to your operating system and applications as well as regularly schedule backing up of data.

Jack Kallis - About Author:
iGennie is a fastest growing online PC solution provider company in US, Canada and UK, Provides Windows Support, Antivirus Support and maintenance.

Share on Facebook Tweet It Stumbleupon this post This post is delicious !

Article Source:

Related Computer Articles Subscribe to RSS

A guide to computer support Edinburgh
Published by Mary Porter on June 19th 2012 | Computer
You do not have to be an IT expert to be able to appreciate the importance of comprehensive computer...
Get valuable SAP help from a SAP support portal
Published by Micel Anderson on December 21st 2011 | Computer
Nowadays, SAP help can be obtained from the internet quite easily. For instance, you can get access ...
Best network security support for your business
Published by Chris Mills on January 25th 2012 | Computer
Whether its public, private, corporate or governmental issue, network security support plays a great...
Enroll with TESDA to provide the best computer technical support and services
Published by Carolmoore on February 28th 2012 | Computer
With a rise in the number of computer technicians, the challenge to provide the best computer techni...
Remote Computer support quintessential for computer business’s success
Published by Paxton on January 2nd 2012 | Computer
This business scope has been identified and judiciously capitalised upon by various remote computer ...
3 Consejos para desinfectar su PC con antivirus
Published by Isi Soto on May 10th 2012 | Computer
La mayoría de los programas maliciosos actuales son técnicamente complejos y son muy difíciles de...
IT support Sydney is professional computer experts
Published by Avena Sowell on April 13th 2012 | Computer
Among the services, that IT support Sydney can give you include data recovery and search engines opt...